Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2010 Issue 9
Application of Digital Signature to Office Automation System
wang zuo ; li dong ; guo xin qi
..............
page:76-77,80
Jiaoda Jump Assisting Yangguang Middle School of Xi\'an Jiaoda in Purifying Network Enviroment
chen yun peng
..............
page:48-49
VRV SpecSEC-Terminal-security Management System Oriented to Network Space
..............
page:50-51
Radio Equipment and Inspection for Drilling Platform
jiang peng
..............
page:73-75
On Possible "Arms Race" in Network Space
..............
page:12
Analysis of Process Gain Based on SNR of Despread Signal
guo zhi qing ; pan feng
..............
page:62-64
Hidden-Danger Analysis and Security Management Solution for Hospital Intranet Security Management
..............
page:43
Isolation and Exchange Across Security Domain
hu jian bin
..............
page:13
Study on WP-SVD-based Image Watermarking Algorithm Against Geometric Attack
wang jin bao
..............
page:84-86
Application of Classification Label and Track Tracing Technology in Intranet Security Management
zhou xian jing
..............
page:24
VRV\'s Terminal-Security Management System Oriented to Network Space
ma zhao feng
..............
page:23
Questions & Answers in Web Security(3)
..............
page:30-31
Exploration on Network-Security Hotspot
wang hui bo
..............
page:19-20,34
Building up Highly-efficient Intranet Infosec Management Platform
..............
page:44-45
Cases Analyses on Intranet Permission for FOTON Auto and Desktop Control & Management
pan chang xin
..............
page:16
Standard, Technology and Market-All-sidedly Comprehending Intranet Security
..............
page:1
Analysis of Hopping Anti-jamming Performance Based on RMFSK
zuo yun ; ning zhi de ; zhong jian bo
..............
page:58-61
xin xi dong tai
..............
page:2-9,57,86,90
Design and Implementation of C/S Structure-based Inventory Management System
gong wei cai
..............
page:68-69,72
Study on Risk Assessment Algorithms Based on Scene Check
shi feng ; gan lu
..............
page:70-72
VUTP Originally-created Technology Security Manager for Secret-involved Network
..............
page:54
An Anti-occlusion and Automatic Tracking Algorithm Based on Mean-shift
song tao ; li lin tao ; song zhen yu
..............
page:65-67
Building up China\'s Independent Trusted Computing Environment
zhao li sheng
..............
page:21
Enhancement of System Security Should Start from Dealing with "Trojan Horse"
..............
page:29
Authentication of Customer Identity in e-bank
zhang huan jiong
..............
page:78-80
Severe Situation and Countermeasure of Information Security and Privacy
qu cheng yi
..............
page:10-11,15
Risk Analysis of Disk Data Leakage and Methods for Data Destruction
chen shang yi
..............
page:81-83
On Account of UTM2,Intranet Security Becomes Simple
yuan zhi hui
..............
page:17
Recent Progress and Situation of Information Anti-leakage Technology
geng zhen min
..............
page:22
The Starting Point for Security is by no means "Standardization"
..............
page:25-26
Integrated Security Solution for Terminals
zhou xian jing
..............
page:42
Building up Carefree Data Anti-leakage Platform of Intranet
pan hua
..............
page:18
How to Guard Against Security Risk Brought to the Interactive TV Network by Information Interaction
wu fan
..............
page:35
Simulation Analysis of Colored Gaussian Process Based on Sum of Rician Sinusoid
zhang jia ming ; yang ming chuan ; guo qing
..............
page:55-57,61
Building up Highly-Efficient e-government Outer Network
gao jing
..............
page:41
Blue-shield Intranet Security and Privacy System
xu jun
..............
page:52-53
Watching "Cloud Security" with a Cold Eye in Hot Wind
..............
page:27-28
Is 30-second Switch Really Safe? Balance Game of Security and Speed for Double-network Isolation
..............
page:38
Arming Secret Work with High Technology——Newly-revised "Secrets Law" Making Still Greateer Demands on Infosec Technology
..............
page:36
Application of Fuzzy FP-growth to Intrusion Detection
feng xiang ; shuai jian mei
..............
page:87-90
Infosec Urgently Demands a Complement of EM Security and Protection
..............
page:32-34
New Progress of Rectification-and-Reform Work on Multi-level Protection Security Construction in 2010
zhu guo bang
..............
page:14-15
Success Cases of Authentication System Construction for Certain Commission
..............
page:39
Integrated Management Solution for Intranet Security of Electric-Power Enterprises
..............
page:40
Joint Efforts by National Technologies and Cooperative Partners——Solid Foundation for Building up China\'s Independent Trusted Computing
..............
page:37
Protection Solution for Enterprises\' Business Secrets——Secrets Shield\'s Application in Cross-nation Enterprises of Yun\'an Board-manufacturing Group
zhang xian
..............
page:46-47,49